References
- ITU-T Y.CCDEF, "Information technology-Distributed application platforms and services-cloud computing - Overview and Vocabulary", 2013.
- Security Requirements for Server Virutalization System, Telecommunications Technology Association, pp. 1-18, 2013.
- F. Sabani, "Virtualization-Level Security in Cloud Computing", International Conference on Communication Software and Networks(ICCSN), pp. 250-254, 2011.
- M. Bishop, Computer Security : Art and Science, Addison Welsey, Vol. 200, 2012.
- H. Zhu, Y. Xue, Y. Zhang, X. Chen, H. Li, and X. Liu, "V-MLR : A Multilevel Security Model for Virtualization", International Conference on Intelligent Networking and Collaborative Systems(ICINCS), pp. 9-16, 2013.
- G. Sala, D. Sgandurra, and F. Baiardi, "Security and Integrity of a Distribute File Storage in a Virtual Environment", IEEE Security In Storage Workshop, pp. 58-69, 2007.
- F. Sabahi, "Cloud Computing Security Threats and Responses", International Conference on Communication Software and Networks(ICCSN), pp. 245-249, 2011.
- M. Khan, K. Sakamura, "Context-Aware Access Control for Clinical Information Systems", International Conference on Innovations in Information Technology, pp. 123-128, 2012.
- T. Y. Win, H. Tianfield, and Q. Mair, "Virtualization Security Combining Mandatory Access Control and Virtual Machine Introspection", International Conference on Utility and Cloud Computing(ICUCC), pp. 1004-1009, 2014.
- G. Cheng, H. Jin, D. Zou, A. K. Ohoussou, and F. Zhao, "A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine Systems", International Conference for Young Computer Scientists(ICYCS), pp. 1481-1487, 2008.
- A. Corradi, R. Montanari, and D. Tibaldi, "Context-based Access Control for ubiquitous Service Provisioning", Proceedings of the COMPSAC '04, 2004.
- K. J. Biba, "Integrity Considerations for Secure Computer Systems", MTR-3153, The Mitre Corporation, 1975.
- D. Zou, L. Shi, H. Jin, "DYM-MAC: A Mandatory Access Control System in Distributed Virtual Computing Environment", International Conference on Parallel and Distributed Systems(ICPDS), pp. 556-563, 2009.
- D. George, V. Nirmal, "SECCON:A Framework for Applying Access Control Policies in Context-Aware Wireless Networks", World Congress on Computing and Communication Technologies, pp. 268-270, 2014.
- National Security Agency, Security-Enhanced Linux(SELinux). http://www.nsa.gov/selinux.
- S. Castano, DATABASE SECURITY, ADDISON-WESLEY. pp. 39-60.
- M. Blanc, J. Briffaut, J.-F., Lalande, C. Toinard, "Distributed Control Enabling Consistent MAC Policies and IDS based on a Meta-Policy approach", IEEE POLICY'06, 2006.
Cited by
- Business Satisfaction with Network Access Control(NAC) Solutions for Active Trade : Focussing on Users vol.17, pp.6, 2016, https://doi.org/10.20462/tebs.2016.12.17.6.305